Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
In mobile ad hoc networks (MANETs), it is effective to retrieve data items using top-k query. However, accurate results may not be acquired in environments when malicious nodes are present. In this paper, we assume that malicious nodes attempt to replace necessary data items with unnecessary ones (w...
Main Authors: | Takuji Tsuda, Yuka Komai, Takahiro Hara, Shojiro Nishio |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2016-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7433393/ |
Similar Items
-
k Nearest Neighbor Search for Location-Dependent Sensor Data in MANETs
by: Yuka Komai, et al.
Published: (2015-01-01) -
Efficient evaluation of Top-k Skyline queries.
by: Marlene Goncalves, et al.
Published: (2010-10-01) -
Top-K Collective Spatial Keyword Queries
by: Danni Su, et al.
Published: (2019-01-01) -
Reputation-Based Opportunistic Routing Protocol Using Q-Learning for MANET Attacked by Malicious Nodes
by: Joonsu Ryu, et al.
Published: (2023-01-01) -
Performance evaluation of manet in presence of black hole nodes
by: Dhahir, Saif Mahmood
Published: (2017)